暂无分享,去创建一个
[1] Bashar Nuseibeh,et al. Expressing the relationships between multiple views in requirements specification , 1993, ICSE '93.
[2] Celia Desmond,et al. Project management office , 2014, IEEE Engineering Management Review.
[3] Dongho Won,et al. Advanced Information Security Management Evaluation System , 2011, KSII Trans. Internet Inf. Syst..
[4] Joey Jansen van Vuuren,et al. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation , 2011 .
[5] Bernard H. Boar,et al. The Art of Strategic Planning for Information Technology: Crafting Strategy for the 90s , 1993 .
[6] Julio Cesar Sampaio do Prado Leite,et al. Requirements Validation Through Viewpoint Resolution , 1991, IEEE Trans. Software Eng..
[7] F. David. How companies define their mission , 1989 .
[8] Bernard H. Boar,et al. The Art of Strategic Planning for Information Technology, Second Edition , 2000 .
[9] Rossouw von Solms,et al. Information Security Governance control through comprehensive policy architectures , 2011, 2011 Information Security for South Africa.
[10] Edward Humphreys,et al. Information security management system standards , 2011, Datenschutz und Datensicherheit - DuD.
[11] Thomas M. Chen,et al. An Assessment of The Department of Defense Strategy for Operating In Cyberspace , 2014 .
[12] Wasfi Alrawabdeh,et al. Internet and the arab world: understanding the key issues and overcoming the barriers , 2009, Int. Arab J. Inf. Technol..
[13] Ian Sommerville,et al. Viewpoints for requirements definition , 1992, Softw. Eng. J..